Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2026-22008 (GCVE-0-2026-22008)
Vulnerability from cvelistv5 – Published: 2026-04-21 20:35 – Updated: 2026-04-22 14:06- Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE accessible data.
| URL | Tags |
|---|---|
| https://www.oracle.com/security-alerts/cpuapr2026.html | vendor-advisory |
| Vendor | Product | Version | |
|---|---|---|---|
| Oracle Corporation | Oracle Java SE |
Affected:
25.0.1
|
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2026-22008",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2026-04-22T14:05:38.294631Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-250",
"description": "CWE-250 Execution with Unnecessary Privileges",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-04-22T14:06:09.562Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "Oracle Java SE",
"vendor": "Oracle Corporation",
"versions": [
{
"status": "affected",
"version": "25.0.1"
}
]
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:oracle:java_se:25.0.1:*:*:*:*:*:*:*",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"descriptions": [
{
"lang": "en-US",
"value": "Vulnerability in Oracle Java SE (component: Libraries). The supported version that is affected is Oracle Java SE: 25.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N)."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 3.7,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE accessible data.",
"lang": "en-US"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-04-21T20:35:05.513Z",
"orgId": "43595867-4340-4103-b7a2-9a5208d29a85",
"shortName": "oracle"
},
"references": [
{
"name": "Oracle Advisory",
"tags": [
"vendor-advisory"
],
"url": "https://www.oracle.com/security-alerts/cpuapr2026.html"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "43595867-4340-4103-b7a2-9a5208d29a85",
"assignerShortName": "oracle",
"cveId": "CVE-2026-22008",
"datePublished": "2026-04-21T20:35:05.513Z",
"dateReserved": "2026-01-05T18:07:34.726Z",
"dateUpdated": "2026-04-22T14:06:09.562Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2026-22008",
"date": "2026-05-20",
"epss": "0.00035",
"percentile": "0.10311"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2026-22008\",\"sourceIdentifier\":\"secalert_us@oracle.com\",\"published\":\"2026-04-21T21:16:26.690\",\"lastModified\":\"2026-04-23T15:03:03.640\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Vulnerability in Oracle Java SE (component: Libraries). The supported version that is affected is Oracle Java SE: 25.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"secalert_us@oracle.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N\",\"baseScore\":3.7,\"baseSeverity\":\"LOW\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.2,\"impactScore\":1.4}]},\"weaknesses\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-250\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jdk:25.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BD1D0136-84A2-4EAD-9641-7E96E4386CAA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jre:25.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"70279FE8-6A11-405B-80CA-B3427C11B35D\"}]}]}],\"references\":[{\"url\":\"https://www.oracle.com/security-alerts/cpuapr2026.html\",\"source\":\"secalert_us@oracle.com\",\"tags\":[\"Vendor Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2026-22008\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2026-04-22T14:05:38.294631Z\"}}}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-250\", \"description\": \"CWE-250 Execution with Unnecessary Privileges\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2026-04-22T14:06:06.186Z\"}}], \"cna\": {\"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 3.7, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"LOW\", \"vectorString\": \"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N\", \"integrityImpact\": \"LOW\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"HIGH\", \"availabilityImpact\": \"NONE\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"NONE\"}}], \"affected\": [{\"vendor\": \"Oracle Corporation\", \"product\": \"Oracle Java SE\", \"versions\": [{\"status\": \"affected\", \"version\": \"25.0.1\"}]}], \"references\": [{\"url\": \"https://www.oracle.com/security-alerts/cpuapr2026.html\", \"name\": \"Oracle Advisory\", \"tags\": [\"vendor-advisory\"]}], \"descriptions\": [{\"lang\": \"en-US\", \"value\": \"Vulnerability in Oracle Java SE (component: Libraries). The supported version that is affected is Oracle Java SE: 25.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en-US\", \"description\": \"Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE accessible data.\"}]}], \"cpeApplicability\": [{\"nodes\": [{\"negate\": false, \"cpeMatch\": [{\"criteria\": \"cpe:2.3:a:oracle:java_se:25.0.1:*:*:*:*:*:*:*\", \"vulnerable\": true}], \"operator\": \"OR\"}]}], \"providerMetadata\": {\"orgId\": \"43595867-4340-4103-b7a2-9a5208d29a85\", \"shortName\": \"oracle\", \"dateUpdated\": \"2026-04-21T20:35:05.513Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2026-22008\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2026-04-22T14:06:09.562Z\", \"dateReserved\": \"2026-01-05T18:07:34.726Z\", \"assignerOrgId\": \"43595867-4340-4103-b7a2-9a5208d29a85\", \"datePublished\": \"2026-04-21T20:35:05.513Z\", \"assignerShortName\": \"oracle\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
alsa-2026:9693
Vulnerability from osv_almalinux
The OpenJDK 25 packages provide the OpenJDK 25 Java Runtime Environment and the OpenJDK 25 Java Software Development Kit.
Security Fix(es):
- JDK: Enhance crypto algorithm support (CVE-2026-22007)
- JDK: Improved Arena allocations (CVE-2026-22008)
- JDK: Improve Kerberos credentialing (CVE-2026-22013)
- JDK: Enhance Path Factories Redux (CVE-2026-22016)
- JDK: Enhance Zip file reading (CVE-2026-22018)
- JDK: Enhance certificate chain validation (CVE-2026-22021)
- JDK: Updating FreeType 2.14.1 (CVE-2026-23865)
- JDK: Enhance TLS connection handling (CVE-2026-34282)
- JDK: Enhance key generation (CVE-2026-34268)
This release also updates a number of third-party libraries included in the JDK. The libraries themselves are affected by the following CVEs, but this is not a statement that the JDK itself is affected:
- giflib: Denial of Service via buffer overflow in EGifGCBToExtension (CVE-2026-26740)
- libpng: Information disclosure and denial of service via out-of-bounds read/write in Neon palette expansion (CVE-2026-33636)
- libpng: Arbitrary code execution due to use-after-free vulnerability (CVE-2026-33416)
Bug Fix(es):
- When copying files, OpenJDK 25 prefers to use the copy_file_range native function for performance reasons, only falling back to sendfile when this fails. However, in previous OpenJDK 25 releases, a response of EOPNOTSUPP (operation not supported) did not cause the JDK to fall back to sendfile. This is rectified in this release. (AlmaLinux-169939, AlmaLinux-169937)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
{
"affected": [
{
"package": {
"ecosystem": "AlmaLinux:10",
"name": "java-25-openjdk"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:25.0.3.0.9-1.el10_2"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:10",
"name": "java-25-openjdk-crypto-adapter"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:25.0.3.0.9-1.el10_2"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:10",
"name": "java-25-openjdk-crypto-adapter-fastdebug"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:25.0.3.0.9-1.el10_2"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:10",
"name": "java-25-openjdk-crypto-adapter-slowdebug"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:25.0.3.0.9-1.el10_2"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:10",
"name": "java-25-openjdk-demo"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:25.0.3.0.9-1.el10_2"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:10",
"name": "java-25-openjdk-demo-fastdebug"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:25.0.3.0.9-1.el10_2"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:10",
"name": "java-25-openjdk-demo-slowdebug"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:25.0.3.0.9-1.el10_2"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:10",
"name": "java-25-openjdk-devel"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:25.0.3.0.9-1.el10_2"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:10",
"name": "java-25-openjdk-devel-fastdebug"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:25.0.3.0.9-1.el10_2"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:10",
"name": "java-25-openjdk-devel-slowdebug"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:25.0.3.0.9-1.el10_2"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:10",
"name": "java-25-openjdk-fastdebug"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:25.0.3.0.9-1.el10_2"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:10",
"name": "java-25-openjdk-headless"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:25.0.3.0.9-1.el10_2"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:10",
"name": "java-25-openjdk-headless-fastdebug"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:25.0.3.0.9-1.el10_2"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:10",
"name": "java-25-openjdk-headless-slowdebug"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:25.0.3.0.9-1.el10_2"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:10",
"name": "java-25-openjdk-javadoc"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:25.0.3.0.9-1.el10_2"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:10",
"name": "java-25-openjdk-javadoc-zip"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:25.0.3.0.9-1.el10_2"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:10",
"name": "java-25-openjdk-jmods"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:25.0.3.0.9-1.el10_2"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:10",
"name": "java-25-openjdk-jmods-fastdebug"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:25.0.3.0.9-1.el10_2"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:10",
"name": "java-25-openjdk-jmods-slowdebug"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:25.0.3.0.9-1.el10_2"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:10",
"name": "java-25-openjdk-slowdebug"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:25.0.3.0.9-1.el10_2"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:10",
"name": "java-25-openjdk-src"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:25.0.3.0.9-1.el10_2"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:10",
"name": "java-25-openjdk-src-fastdebug"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:25.0.3.0.9-1.el10_2"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:10",
"name": "java-25-openjdk-src-slowdebug"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:25.0.3.0.9-1.el10_2"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:10",
"name": "java-25-openjdk-static-libs"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:25.0.3.0.9-1.el10_2"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:10",
"name": "java-25-openjdk-static-libs-fastdebug"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:25.0.3.0.9-1.el10_2"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:10",
"name": "java-25-openjdk-static-libs-slowdebug"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:25.0.3.0.9-1.el10_2"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "java-25-openjdk"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:25.0.3.0.9-1.el9.alma.1"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "java-25-openjdk-crypto-adapter"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:25.0.3.0.9-1.el9.alma.1"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "java-25-openjdk-crypto-adapter-fastdebug"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:25.0.3.0.9-1.el9.alma.1"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "java-25-openjdk-crypto-adapter-slowdebug"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:25.0.3.0.9-1.el9.alma.1"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "java-25-openjdk-demo"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:25.0.3.0.9-1.el9.alma.1"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "java-25-openjdk-demo-fastdebug"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:25.0.3.0.9-1.el9.alma.1"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "java-25-openjdk-demo-slowdebug"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:25.0.3.0.9-1.el9.alma.1"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "java-25-openjdk-devel"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:25.0.3.0.9-1.el9.alma.1"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "java-25-openjdk-devel-fastdebug"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:25.0.3.0.9-1.el9.alma.1"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "java-25-openjdk-devel-slowdebug"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:25.0.3.0.9-1.el9.alma.1"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "java-25-openjdk-fastdebug"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:25.0.3.0.9-1.el9.alma.1"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "java-25-openjdk-headless"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:25.0.3.0.9-1.el9.alma.1"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "java-25-openjdk-headless-fastdebug"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:25.0.3.0.9-1.el9.alma.1"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "java-25-openjdk-headless-slowdebug"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:25.0.3.0.9-1.el9.alma.1"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "java-25-openjdk-javadoc"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:25.0.3.0.9-1.el9.alma.1"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "java-25-openjdk-javadoc-zip"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:25.0.3.0.9-1.el9.alma.1"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "java-25-openjdk-jmods"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:25.0.3.0.9-1.el9.alma.1"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "java-25-openjdk-jmods-fastdebug"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:25.0.3.0.9-1.el9.alma.1"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "java-25-openjdk-jmods-slowdebug"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:25.0.3.0.9-1.el9.alma.1"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "java-25-openjdk-slowdebug"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:25.0.3.0.9-1.el9.alma.1"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "java-25-openjdk-src"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:25.0.3.0.9-1.el9.alma.1"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "java-25-openjdk-src-fastdebug"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:25.0.3.0.9-1.el9.alma.1"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "java-25-openjdk-src-slowdebug"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:25.0.3.0.9-1.el9.alma.1"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "java-25-openjdk-static-libs"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:25.0.3.0.9-1.el9.alma.1"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "java-25-openjdk-static-libs-fastdebug"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:25.0.3.0.9-1.el9.alma.1"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "java-25-openjdk-static-libs-slowdebug"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:25.0.3.0.9-1.el9.alma.1"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"details": "The OpenJDK 25 packages provide the OpenJDK 25 Java Runtime Environment and the OpenJDK 25 Java Software Development Kit. \n\nSecurity Fix(es): \n\n * JDK: Enhance crypto algorithm support (CVE-2026-22007)\n * JDK: Improved Arena allocations (CVE-2026-22008)\n * JDK: Improve Kerberos credentialing (CVE-2026-22013)\n * JDK: Enhance Path Factories Redux (CVE-2026-22016)\n * JDK: Enhance Zip file reading (CVE-2026-22018)\n * JDK: Enhance certificate chain validation (CVE-2026-22021)\n * JDK: Updating FreeType 2.14.1 (CVE-2026-23865)\n * JDK: Enhance TLS connection handling (CVE-2026-34282)\n * JDK: Enhance key generation (CVE-2026-34268)\n\n\nThis release also updates a number of third-party libraries included in the JDK. The libraries themselves are affected by the following CVEs, but this is not a statement that the JDK itself is affected: \n\n * giflib: Denial of Service via buffer overflow in EGifGCBToExtension (CVE-2026-26740)\n * libpng: Information disclosure and denial of service via out-of-bounds read/write in Neon palette expansion (CVE-2026-33636)\n * libpng: Arbitrary code execution due to use-after-free vulnerability (CVE-2026-33416)\n\n\nBug Fix(es): \n\n * When copying files, OpenJDK 25 prefers to use the copy_file_range native function for performance reasons, only falling back to sendfile when this fails. However, in previous OpenJDK 25 releases, a response of EOPNOTSUPP (operation not supported) did not cause the JDK to fall back to sendfile. This is rectified in this release. (AlmaLinux-169939, AlmaLinux-169937)\n\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n",
"id": "ALSA-2026:9693",
"modified": "2026-04-24T09:58:24Z",
"published": "2026-04-22T00:00:00Z",
"references": [
{
"type": "ADVISORY",
"url": "https://access.redhat.com/errata/RHSA-2026:9693"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2026-22007"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2026-22008"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2026-22013"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2026-22016"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2026-22018"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2026-22021"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2026-23865"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2026-26740"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2026-33416"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2026-33636"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2026-34268"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2026-34282"
},
{
"type": "ADVISORY",
"url": "https://errata.almalinux.org/10/ALSA-2026-9693.html"
},
{
"type": "ADVISORY",
"url": "https://errata.almalinux.org/9/ALSA-2026-9693.html"
}
],
"related": [
"CVE-2026-22007",
"CVE-2026-22008",
"CVE-2026-22013",
"CVE-2026-22016",
"CVE-2026-22018",
"CVE-2026-22021",
"CVE-2026-23865",
"CVE-2026-34282",
"CVE-2026-34268",
"CVE-2026-26740",
"CVE-2026-33636",
"CVE-2026-33416"
],
"summary": "Important: java-25-openjdk security update"
}
bit-java-2026-22008
Vulnerability from bitnami_vulndb
Vulnerability in Oracle Java SE (component: Libraries). The supported version that is affected is Oracle Java SE: 25.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).
{
"affected": [
{
"package": {
"ecosystem": "Bitnami",
"name": "java",
"purl": "pkg:bitnami/java"
},
"ranges": [
{
"events": [
{
"introduced": "22.0.0"
},
{
"fixed": "25.0.2"
}
],
"type": "SEMVER"
}
],
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
"type": "CVSS_V3"
}
]
}
],
"aliases": [
"CVE-2026-22008"
],
"database_specific": {
"cpes": [
"cpe:2.3:a:bellsoft:libericajdk:*:*:*:*:*:*:*:*"
],
"severity": "Low"
},
"details": "Vulnerability in Oracle Java SE (component: Libraries). The supported version that is affected is Oracle Java SE: 25.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).",
"id": "BIT-java-2026-22008",
"modified": "2026-05-08T06:11:36.072Z",
"published": "2026-05-06T14:46:09.450Z",
"references": [
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-22008"
},
{
"type": "WEB",
"url": "https://www.oracle.com/security-alerts/cpuapr2026.html"
}
],
"schema_version": "1.6.2"
}
bit-jre-2026-22008
Vulnerability from bitnami_vulndb
Vulnerability in Oracle Java SE (component: Libraries). The supported version that is affected is Oracle Java SE: 25.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).
{
"affected": [
{
"package": {
"ecosystem": "Bitnami",
"name": "jre",
"purl": "pkg:bitnami/jre"
},
"ranges": [
{
"events": [
{
"introduced": "22.0.0"
},
{
"fixed": "25.0.2"
}
],
"type": "SEMVER"
}
],
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
"type": "CVSS_V3"
}
]
}
],
"aliases": [
"CVE-2026-22008"
],
"database_specific": {
"cpes": [
"cpe:2.3:a:bellsoft:libericajre:*:*:*:*:*:*:*:*"
],
"severity": "Low"
},
"details": "Vulnerability in Oracle Java SE (component: Libraries). The supported version that is affected is Oracle Java SE: 25.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).",
"id": "BIT-jre-2026-22008",
"modified": "2026-05-08T06:11:36.072Z",
"published": "2026-05-08T05:47:52.496Z",
"references": [
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-22008"
},
{
"type": "WEB",
"url": "https://www.oracle.com/security-alerts/cpuapr2026.html"
}
],
"schema_version": "1.6.2"
}
CERTFR-2026-AVI-0468
Vulnerability from certfr_avis - Published: 2026-04-22 - Updated: 2026-04-22
De multiples vulnérabilités ont été découvertes dans Oracle Java SE. Elles permettent à un attaquant de provoquer un déni de service à distance, une atteinte à la confidentialité des données et une atteinte à l'intégrité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Oracle | Java SE | Oracle GraalVM Enterprise Edition version 21.3.17 | ||
| Oracle | Java SE | Oracle Java SE version 25.0.1 | ||
| Oracle | Java SE | Oracle Java SE version 17.0.18 | ||
| Oracle | Java SE | Oracle Java SE version 26 | ||
| Oracle | Java SE | Oracle Java SE version 25.0.2 | ||
| Oracle | Java SE | Oracle GraalVM for JDK version 21.0.10 | ||
| Oracle | Java SE | Oracle GraalVM for JDK version 17.0.18 | ||
| Oracle | Java SE | Oracle Java SE version 11.0.30 | ||
| Oracle | Java SE | Oracle Java SE version 8u481-perf | ||
| Oracle | Java SE | Oracle Java SE version 21.0.10 | ||
| Oracle | Java SE | Oracle Java SE version 8u481 | ||
| Oracle | Java SE | Oracle Java SE version 8u481-b50 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Oracle GraalVM Enterprise Edition version 21.3.17",
"product": {
"name": "Java SE",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Java SE version 25.0.1",
"product": {
"name": "Java SE",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Java SE version 17.0.18",
"product": {
"name": "Java SE",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Java SE version 26",
"product": {
"name": "Java SE",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Java SE version 25.0.2",
"product": {
"name": "Java SE",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle GraalVM for JDK version 21.0.10",
"product": {
"name": "Java SE",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle GraalVM for JDK version 17.0.18",
"product": {
"name": "Java SE",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Java SE version 11.0.30",
"product": {
"name": "Java SE",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Java SE version 8u481-perf",
"product": {
"name": "Java SE",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Java SE version 21.0.10",
"product": {
"name": "Java SE",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Java SE version 8u481",
"product": {
"name": "Java SE",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Java SE version 8u481-b50",
"product": {
"name": "Java SE",
"vendor": {
"name": "Oracle",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2026-20652",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-20652"
},
{
"name": "CVE-2026-20676",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-20676"
},
{
"name": "CVE-2026-22013",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22013"
},
{
"name": "CVE-2026-22018",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22018"
},
{
"name": "CVE-2026-34282",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-34282"
},
{
"name": "CVE-2026-22003",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22003"
},
{
"name": "CVE-2026-23865",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23865"
},
{
"name": "CVE-2026-20608",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-20608"
},
{
"name": "CVE-2026-20636",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-20636"
},
{
"name": "CVE-2026-20635",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-20635"
},
{
"name": "CVE-2026-22016",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22016"
},
{
"name": "CVE-2026-22021",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22021"
},
{
"name": "CVE-2026-22007",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22007"
},
{
"name": "CVE-2026-34268",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-34268"
},
{
"name": "CVE-2026-20644",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-20644"
},
{
"name": "CVE-2025-43457",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43457"
},
{
"name": "CVE-2026-22008",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22008"
}
],
"initial_release_date": "2026-04-22T00:00:00",
"last_revision_date": "2026-04-22T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0468",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-04-22T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Oracle Java SE. Elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Oracle Java SE",
"vendor_advisories": [
{
"published_at": "2026-04-21",
"title": "Bulletin de s\u00e9curit\u00e9 Oracle Java SE cpuapr2026",
"url": "https://www.oracle.com/security-alerts/cpuapr2026.html"
}
]
}
FKIE_CVE-2026-22008
Vulnerability from fkie_nvd - Published: 2026-04-21 21:16 - Updated: 2026-04-23 15:03| URL | Tags | ||
|---|---|---|---|
| secalert_us@oracle.com | https://www.oracle.com/security-alerts/cpuapr2026.html | Vendor Advisory |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:oracle:jdk:25.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "BD1D0136-84A2-4EAD-9641-7E96E4386CAA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jre:25.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "70279FE8-6A11-405B-80CA-B3427C11B35D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Vulnerability in Oracle Java SE (component: Libraries). The supported version that is affected is Oracle Java SE: 25.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N)."
}
],
"id": "CVE-2026-22008",
"lastModified": "2026-04-23T15:03:03.640",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 3.7,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.2,
"impactScore": 1.4,
"source": "secalert_us@oracle.com",
"type": "Secondary"
}
]
},
"published": "2026-04-21T21:16:26.690",
"references": [
{
"source": "secalert_us@oracle.com",
"tags": [
"Vendor Advisory"
],
"url": "https://www.oracle.com/security-alerts/cpuapr2026.html"
}
],
"sourceIdentifier": "secalert_us@oracle.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-250"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
GHSA-FFGJ-WMRH-M8FR
Vulnerability from github – Published: 2026-04-21 21:31 – Updated: 2026-04-21 21:31Vulnerability in Oracle Java SE (component: Libraries). The supported version that is affected is Oracle Java SE: 25.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).
{
"affected": [],
"aliases": [
"CVE-2026-22008"
],
"database_specific": {
"cwe_ids": [
"CWE-250"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2026-04-21T21:16:26Z",
"severity": "LOW"
},
"details": "Vulnerability in Oracle Java SE (component: Libraries). The supported version that is affected is Oracle Java SE: 25.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).",
"id": "GHSA-ffgj-wmrh-m8fr",
"modified": "2026-04-21T21:31:24Z",
"published": "2026-04-21T21:31:24Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-22008"
},
{
"type": "WEB",
"url": "https://www.oracle.com/security-alerts/cpuapr2026.html"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
"type": "CVSS_V3"
}
]
}
OPENSUSE-SU-2026:10639-1
Vulnerability from csaf_opensuse - Published: 2026-04-28 00:00 - Updated: 2026-04-28 00:00| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-25.0.3.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-25.0.3.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-25.0.3.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-25.0.3.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-demo-25.0.3.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-demo-25.0.3.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-demo-25.0.3.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-demo-25.0.3.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-devel-25.0.3.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-devel-25.0.3.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-devel-25.0.3.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-devel-25.0.3.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-headless-25.0.3.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-headless-25.0.3.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-headless-25.0.3.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-headless-25.0.3.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-javadoc-25.0.3.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-javadoc-25.0.3.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-javadoc-25.0.3.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-javadoc-25.0.3.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-jmods-25.0.3.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-jmods-25.0.3.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-jmods-25.0.3.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-jmods-25.0.3.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-src-25.0.3.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-src-25.0.3.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-src-25.0.3.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-src-25.0.3.0-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-25.0.3.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-25.0.3.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-25.0.3.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-25.0.3.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-demo-25.0.3.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-demo-25.0.3.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-demo-25.0.3.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-demo-25.0.3.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-devel-25.0.3.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-devel-25.0.3.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-devel-25.0.3.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-devel-25.0.3.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-headless-25.0.3.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-headless-25.0.3.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-headless-25.0.3.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-headless-25.0.3.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-javadoc-25.0.3.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-javadoc-25.0.3.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-javadoc-25.0.3.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-javadoc-25.0.3.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-jmods-25.0.3.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-jmods-25.0.3.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-jmods-25.0.3.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-jmods-25.0.3.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-src-25.0.3.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-src-25.0.3.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-src-25.0.3.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-src-25.0.3.0-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-25.0.3.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-25.0.3.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-25.0.3.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-25.0.3.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-demo-25.0.3.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-demo-25.0.3.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-demo-25.0.3.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-demo-25.0.3.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-devel-25.0.3.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-devel-25.0.3.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-devel-25.0.3.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-devel-25.0.3.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-headless-25.0.3.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-headless-25.0.3.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-headless-25.0.3.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-headless-25.0.3.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-javadoc-25.0.3.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-javadoc-25.0.3.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-javadoc-25.0.3.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-javadoc-25.0.3.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-jmods-25.0.3.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-jmods-25.0.3.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-jmods-25.0.3.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-jmods-25.0.3.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-src-25.0.3.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-src-25.0.3.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-src-25.0.3.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-src-25.0.3.0-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-25.0.3.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-25.0.3.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-25.0.3.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-25.0.3.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-demo-25.0.3.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-demo-25.0.3.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-demo-25.0.3.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-demo-25.0.3.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-devel-25.0.3.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-devel-25.0.3.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-devel-25.0.3.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-devel-25.0.3.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-headless-25.0.3.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-headless-25.0.3.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-headless-25.0.3.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-headless-25.0.3.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-javadoc-25.0.3.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-javadoc-25.0.3.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-javadoc-25.0.3.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-javadoc-25.0.3.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-jmods-25.0.3.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-jmods-25.0.3.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-jmods-25.0.3.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-jmods-25.0.3.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-src-25.0.3.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-src-25.0.3.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-src-25.0.3.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-src-25.0.3.0-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-25.0.3.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-25.0.3.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-25.0.3.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-25.0.3.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-demo-25.0.3.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-demo-25.0.3.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-demo-25.0.3.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-demo-25.0.3.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-devel-25.0.3.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-devel-25.0.3.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-devel-25.0.3.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-devel-25.0.3.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-headless-25.0.3.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-headless-25.0.3.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-headless-25.0.3.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-headless-25.0.3.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-javadoc-25.0.3.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-javadoc-25.0.3.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-javadoc-25.0.3.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-javadoc-25.0.3.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-jmods-25.0.3.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-jmods-25.0.3.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-jmods-25.0.3.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-jmods-25.0.3.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-src-25.0.3.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-src-25.0.3.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-src-25.0.3.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-src-25.0.3.0-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-25.0.3.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-25.0.3.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-25.0.3.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-25.0.3.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-demo-25.0.3.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-demo-25.0.3.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-demo-25.0.3.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-demo-25.0.3.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-devel-25.0.3.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-devel-25.0.3.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-devel-25.0.3.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-devel-25.0.3.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-headless-25.0.3.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-headless-25.0.3.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-headless-25.0.3.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-headless-25.0.3.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-javadoc-25.0.3.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-javadoc-25.0.3.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-javadoc-25.0.3.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-javadoc-25.0.3.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-jmods-25.0.3.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-jmods-25.0.3.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-jmods-25.0.3.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-jmods-25.0.3.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-src-25.0.3.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-src-25.0.3.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-src-25.0.3.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-src-25.0.3.0-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-25.0.3.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-25.0.3.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-25.0.3.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-25.0.3.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-demo-25.0.3.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-demo-25.0.3.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-demo-25.0.3.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-demo-25.0.3.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-devel-25.0.3.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-devel-25.0.3.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-devel-25.0.3.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-devel-25.0.3.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-headless-25.0.3.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-headless-25.0.3.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-headless-25.0.3.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-headless-25.0.3.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-javadoc-25.0.3.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-javadoc-25.0.3.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-javadoc-25.0.3.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-javadoc-25.0.3.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-jmods-25.0.3.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-jmods-25.0.3.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-jmods-25.0.3.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-jmods-25.0.3.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-src-25.0.3.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-src-25.0.3.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-src-25.0.3.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-src-25.0.3.0-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-25.0.3.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-25.0.3.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-25.0.3.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-25.0.3.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-demo-25.0.3.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-demo-25.0.3.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-demo-25.0.3.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-demo-25.0.3.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-devel-25.0.3.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-devel-25.0.3.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-devel-25.0.3.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-devel-25.0.3.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-headless-25.0.3.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-headless-25.0.3.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-headless-25.0.3.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-headless-25.0.3.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-javadoc-25.0.3.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-javadoc-25.0.3.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-javadoc-25.0.3.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-javadoc-25.0.3.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-jmods-25.0.3.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-jmods-25.0.3.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-jmods-25.0.3.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-jmods-25.0.3.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-src-25.0.3.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-src-25.0.3.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-src-25.0.3.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-src-25.0.3.0-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-25.0.3.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-25.0.3.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-25.0.3.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-25.0.3.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-demo-25.0.3.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-demo-25.0.3.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-demo-25.0.3.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-demo-25.0.3.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-devel-25.0.3.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-devel-25.0.3.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-devel-25.0.3.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-devel-25.0.3.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-headless-25.0.3.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-headless-25.0.3.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-headless-25.0.3.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-headless-25.0.3.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-javadoc-25.0.3.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-javadoc-25.0.3.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-javadoc-25.0.3.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-javadoc-25.0.3.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-jmods-25.0.3.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-jmods-25.0.3.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-jmods-25.0.3.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-jmods-25.0.3.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-src-25.0.3.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-src-25.0.3.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-src-25.0.3.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:java-25-openjdk-src-25.0.3.0-1.1.x86_64 | — |
Vendor Fix
|
| URL | Category |
|---|---|
| https://www.suse.com/support/security/rating/ | external |
| https://ftp.suse.com/pub/projects/security/csaf/o… | self |
| https://www.suse.com/security/cve/CVE-2026-22007/ | self |
| https://www.suse.com/security/cve/CVE-2026-22008/ | self |
| https://www.suse.com/security/cve/CVE-2026-22013/ | self |
| https://www.suse.com/security/cve/CVE-2026-22016/ | self |
| https://www.suse.com/security/cve/CVE-2026-22018/ | self |
| https://www.suse.com/security/cve/CVE-2026-22021/ | self |
| https://www.suse.com/security/cve/CVE-2026-23865/ | self |
| https://www.suse.com/security/cve/CVE-2026-34268/ | self |
| https://www.suse.com/security/cve/CVE-2026-34282/ | self |
| https://www.suse.com/security/cve/CVE-2026-22007 | external |
| https://bugzilla.suse.com/1262490 | external |
| https://www.suse.com/security/cve/CVE-2026-22008 | external |
| https://bugzilla.suse.com/1262493 | external |
| https://www.suse.com/security/cve/CVE-2026-22013 | external |
| https://bugzilla.suse.com/1262494 | external |
| https://www.suse.com/security/cve/CVE-2026-22016 | external |
| https://bugzilla.suse.com/1262495 | external |
| https://www.suse.com/security/cve/CVE-2026-22018 | external |
| https://bugzilla.suse.com/1262496 | external |
| https://www.suse.com/security/cve/CVE-2026-22021 | external |
| https://bugzilla.suse.com/1262497 | external |
| https://www.suse.com/security/cve/CVE-2026-23865 | external |
| https://bugzilla.suse.com/1259118 | external |
| https://www.suse.com/security/cve/CVE-2026-34268 | external |
| https://bugzilla.suse.com/1262500 | external |
| https://www.suse.com/security/cve/CVE-2026-34282 | external |
| https://bugzilla.suse.com/1262501 | external |
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "java-25-openjdk-25.0.3.0-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the java-25-openjdk-25.0.3.0-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2026-10639",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2026_10639-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-22007 page",
"url": "https://www.suse.com/security/cve/CVE-2026-22007/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-22008 page",
"url": "https://www.suse.com/security/cve/CVE-2026-22008/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-22013 page",
"url": "https://www.suse.com/security/cve/CVE-2026-22013/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-22016 page",
"url": "https://www.suse.com/security/cve/CVE-2026-22016/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-22018 page",
"url": "https://www.suse.com/security/cve/CVE-2026-22018/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-22021 page",
"url": "https://www.suse.com/security/cve/CVE-2026-22021/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23865 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23865/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-34268 page",
"url": "https://www.suse.com/security/cve/CVE-2026-34268/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-34282 page",
"url": "https://www.suse.com/security/cve/CVE-2026-34282/"
}
],
"title": "java-25-openjdk-25.0.3.0-1.1 on GA media",
"tracking": {
"current_release_date": "2026-04-28T00:00:00Z",
"generator": {
"date": "2026-04-28T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2026:10639-1",
"initial_release_date": "2026-04-28T00:00:00Z",
"revision_history": [
{
"date": "2026-04-28T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "java-25-openjdk-25.0.3.0-1.1.aarch64",
"product": {
"name": "java-25-openjdk-25.0.3.0-1.1.aarch64",
"product_id": "java-25-openjdk-25.0.3.0-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "java-25-openjdk-demo-25.0.3.0-1.1.aarch64",
"product": {
"name": "java-25-openjdk-demo-25.0.3.0-1.1.aarch64",
"product_id": "java-25-openjdk-demo-25.0.3.0-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "java-25-openjdk-devel-25.0.3.0-1.1.aarch64",
"product": {
"name": "java-25-openjdk-devel-25.0.3.0-1.1.aarch64",
"product_id": "java-25-openjdk-devel-25.0.3.0-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "java-25-openjdk-headless-25.0.3.0-1.1.aarch64",
"product": {
"name": "java-25-openjdk-headless-25.0.3.0-1.1.aarch64",
"product_id": "java-25-openjdk-headless-25.0.3.0-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "java-25-openjdk-javadoc-25.0.3.0-1.1.aarch64",
"product": {
"name": "java-25-openjdk-javadoc-25.0.3.0-1.1.aarch64",
"product_id": "java-25-openjdk-javadoc-25.0.3.0-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "java-25-openjdk-jmods-25.0.3.0-1.1.aarch64",
"product": {
"name": "java-25-openjdk-jmods-25.0.3.0-1.1.aarch64",
"product_id": "java-25-openjdk-jmods-25.0.3.0-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "java-25-openjdk-src-25.0.3.0-1.1.aarch64",
"product": {
"name": "java-25-openjdk-src-25.0.3.0-1.1.aarch64",
"product_id": "java-25-openjdk-src-25.0.3.0-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "java-25-openjdk-25.0.3.0-1.1.ppc64le",
"product": {
"name": "java-25-openjdk-25.0.3.0-1.1.ppc64le",
"product_id": "java-25-openjdk-25.0.3.0-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "java-25-openjdk-demo-25.0.3.0-1.1.ppc64le",
"product": {
"name": "java-25-openjdk-demo-25.0.3.0-1.1.ppc64le",
"product_id": "java-25-openjdk-demo-25.0.3.0-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "java-25-openjdk-devel-25.0.3.0-1.1.ppc64le",
"product": {
"name": "java-25-openjdk-devel-25.0.3.0-1.1.ppc64le",
"product_id": "java-25-openjdk-devel-25.0.3.0-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "java-25-openjdk-headless-25.0.3.0-1.1.ppc64le",
"product": {
"name": "java-25-openjdk-headless-25.0.3.0-1.1.ppc64le",
"product_id": "java-25-openjdk-headless-25.0.3.0-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "java-25-openjdk-javadoc-25.0.3.0-1.1.ppc64le",
"product": {
"name": "java-25-openjdk-javadoc-25.0.3.0-1.1.ppc64le",
"product_id": "java-25-openjdk-javadoc-25.0.3.0-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "java-25-openjdk-jmods-25.0.3.0-1.1.ppc64le",
"product": {
"name": "java-25-openjdk-jmods-25.0.3.0-1.1.ppc64le",
"product_id": "java-25-openjdk-jmods-25.0.3.0-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "java-25-openjdk-src-25.0.3.0-1.1.ppc64le",
"product": {
"name": "java-25-openjdk-src-25.0.3.0-1.1.ppc64le",
"product_id": "java-25-openjdk-src-25.0.3.0-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "java-25-openjdk-25.0.3.0-1.1.s390x",
"product": {
"name": "java-25-openjdk-25.0.3.0-1.1.s390x",
"product_id": "java-25-openjdk-25.0.3.0-1.1.s390x"
}
},
{
"category": "product_version",
"name": "java-25-openjdk-demo-25.0.3.0-1.1.s390x",
"product": {
"name": "java-25-openjdk-demo-25.0.3.0-1.1.s390x",
"product_id": "java-25-openjdk-demo-25.0.3.0-1.1.s390x"
}
},
{
"category": "product_version",
"name": "java-25-openjdk-devel-25.0.3.0-1.1.s390x",
"product": {
"name": "java-25-openjdk-devel-25.0.3.0-1.1.s390x",
"product_id": "java-25-openjdk-devel-25.0.3.0-1.1.s390x"
}
},
{
"category": "product_version",
"name": "java-25-openjdk-headless-25.0.3.0-1.1.s390x",
"product": {
"name": "java-25-openjdk-headless-25.0.3.0-1.1.s390x",
"product_id": "java-25-openjdk-headless-25.0.3.0-1.1.s390x"
}
},
{
"category": "product_version",
"name": "java-25-openjdk-javadoc-25.0.3.0-1.1.s390x",
"product": {
"name": "java-25-openjdk-javadoc-25.0.3.0-1.1.s390x",
"product_id": "java-25-openjdk-javadoc-25.0.3.0-1.1.s390x"
}
},
{
"category": "product_version",
"name": "java-25-openjdk-jmods-25.0.3.0-1.1.s390x",
"product": {
"name": "java-25-openjdk-jmods-25.0.3.0-1.1.s390x",
"product_id": "java-25-openjdk-jmods-25.0.3.0-1.1.s390x"
}
},
{
"category": "product_version",
"name": "java-25-openjdk-src-25.0.3.0-1.1.s390x",
"product": {
"name": "java-25-openjdk-src-25.0.3.0-1.1.s390x",
"product_id": "java-25-openjdk-src-25.0.3.0-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "java-25-openjdk-25.0.3.0-1.1.x86_64",
"product": {
"name": "java-25-openjdk-25.0.3.0-1.1.x86_64",
"product_id": "java-25-openjdk-25.0.3.0-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "java-25-openjdk-demo-25.0.3.0-1.1.x86_64",
"product": {
"name": "java-25-openjdk-demo-25.0.3.0-1.1.x86_64",
"product_id": "java-25-openjdk-demo-25.0.3.0-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "java-25-openjdk-devel-25.0.3.0-1.1.x86_64",
"product": {
"name": "java-25-openjdk-devel-25.0.3.0-1.1.x86_64",
"product_id": "java-25-openjdk-devel-25.0.3.0-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "java-25-openjdk-headless-25.0.3.0-1.1.x86_64",
"product": {
"name": "java-25-openjdk-headless-25.0.3.0-1.1.x86_64",
"product_id": "java-25-openjdk-headless-25.0.3.0-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "java-25-openjdk-javadoc-25.0.3.0-1.1.x86_64",
"product": {
"name": "java-25-openjdk-javadoc-25.0.3.0-1.1.x86_64",
"product_id": "java-25-openjdk-javadoc-25.0.3.0-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "java-25-openjdk-jmods-25.0.3.0-1.1.x86_64",
"product": {
"name": "java-25-openjdk-jmods-25.0.3.0-1.1.x86_64",
"product_id": "java-25-openjdk-jmods-25.0.3.0-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "java-25-openjdk-src-25.0.3.0-1.1.x86_64",
"product": {
"name": "java-25-openjdk-src-25.0.3.0-1.1.x86_64",
"product_id": "java-25-openjdk-src-25.0.3.0-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "java-25-openjdk-25.0.3.0-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:java-25-openjdk-25.0.3.0-1.1.aarch64"
},
"product_reference": "java-25-openjdk-25.0.3.0-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-25-openjdk-25.0.3.0-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:java-25-openjdk-25.0.3.0-1.1.ppc64le"
},
"product_reference": "java-25-openjdk-25.0.3.0-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-25-openjdk-25.0.3.0-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:java-25-openjdk-25.0.3.0-1.1.s390x"
},
"product_reference": "java-25-openjdk-25.0.3.0-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-25-openjdk-25.0.3.0-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:java-25-openjdk-25.0.3.0-1.1.x86_64"
},
"product_reference": "java-25-openjdk-25.0.3.0-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-25-openjdk-demo-25.0.3.0-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:java-25-openjdk-demo-25.0.3.0-1.1.aarch64"
},
"product_reference": "java-25-openjdk-demo-25.0.3.0-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-25-openjdk-demo-25.0.3.0-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:java-25-openjdk-demo-25.0.3.0-1.1.ppc64le"
},
"product_reference": "java-25-openjdk-demo-25.0.3.0-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-25-openjdk-demo-25.0.3.0-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:java-25-openjdk-demo-25.0.3.0-1.1.s390x"
},
"product_reference": "java-25-openjdk-demo-25.0.3.0-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-25-openjdk-demo-25.0.3.0-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:java-25-openjdk-demo-25.0.3.0-1.1.x86_64"
},
"product_reference": "java-25-openjdk-demo-25.0.3.0-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-25-openjdk-devel-25.0.3.0-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:java-25-openjdk-devel-25.0.3.0-1.1.aarch64"
},
"product_reference": "java-25-openjdk-devel-25.0.3.0-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-25-openjdk-devel-25.0.3.0-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:java-25-openjdk-devel-25.0.3.0-1.1.ppc64le"
},
"product_reference": "java-25-openjdk-devel-25.0.3.0-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-25-openjdk-devel-25.0.3.0-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:java-25-openjdk-devel-25.0.3.0-1.1.s390x"
},
"product_reference": "java-25-openjdk-devel-25.0.3.0-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-25-openjdk-devel-25.0.3.0-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:java-25-openjdk-devel-25.0.3.0-1.1.x86_64"
},
"product_reference": "java-25-openjdk-devel-25.0.3.0-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-25-openjdk-headless-25.0.3.0-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:java-25-openjdk-headless-25.0.3.0-1.1.aarch64"
},
"product_reference": "java-25-openjdk-headless-25.0.3.0-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-25-openjdk-headless-25.0.3.0-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:java-25-openjdk-headless-25.0.3.0-1.1.ppc64le"
},
"product_reference": "java-25-openjdk-headless-25.0.3.0-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-25-openjdk-headless-25.0.3.0-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:java-25-openjdk-headless-25.0.3.0-1.1.s390x"
},
"product_reference": "java-25-openjdk-headless-25.0.3.0-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-25-openjdk-headless-25.0.3.0-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:java-25-openjdk-headless-25.0.3.0-1.1.x86_64"
},
"product_reference": "java-25-openjdk-headless-25.0.3.0-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-25-openjdk-javadoc-25.0.3.0-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:java-25-openjdk-javadoc-25.0.3.0-1.1.aarch64"
},
"product_reference": "java-25-openjdk-javadoc-25.0.3.0-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-25-openjdk-javadoc-25.0.3.0-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:java-25-openjdk-javadoc-25.0.3.0-1.1.ppc64le"
},
"product_reference": "java-25-openjdk-javadoc-25.0.3.0-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-25-openjdk-javadoc-25.0.3.0-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:java-25-openjdk-javadoc-25.0.3.0-1.1.s390x"
},
"product_reference": "java-25-openjdk-javadoc-25.0.3.0-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-25-openjdk-javadoc-25.0.3.0-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:java-25-openjdk-javadoc-25.0.3.0-1.1.x86_64"
},
"product_reference": "java-25-openjdk-javadoc-25.0.3.0-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-25-openjdk-jmods-25.0.3.0-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:java-25-openjdk-jmods-25.0.3.0-1.1.aarch64"
},
"product_reference": "java-25-openjdk-jmods-25.0.3.0-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-25-openjdk-jmods-25.0.3.0-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:java-25-openjdk-jmods-25.0.3.0-1.1.ppc64le"
},
"product_reference": "java-25-openjdk-jmods-25.0.3.0-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-25-openjdk-jmods-25.0.3.0-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:java-25-openjdk-jmods-25.0.3.0-1.1.s390x"
},
"product_reference": "java-25-openjdk-jmods-25.0.3.0-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-25-openjdk-jmods-25.0.3.0-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:java-25-openjdk-jmods-25.0.3.0-1.1.x86_64"
},
"product_reference": "java-25-openjdk-jmods-25.0.3.0-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-25-openjdk-src-25.0.3.0-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:java-25-openjdk-src-25.0.3.0-1.1.aarch64"
},
"product_reference": "java-25-openjdk-src-25.0.3.0-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-25-openjdk-src-25.0.3.0-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:java-25-openjdk-src-25.0.3.0-1.1.ppc64le"
},
"product_reference": "java-25-openjdk-src-25.0.3.0-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-25-openjdk-src-25.0.3.0-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:java-25-openjdk-src-25.0.3.0-1.1.s390x"
},
"product_reference": "java-25-openjdk-src-25.0.3.0-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-25-openjdk-src-25.0.3.0-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:java-25-openjdk-src-25.0.3.0-1.1.x86_64"
},
"product_reference": "java-25-openjdk-src-25.0.3.0-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-22007",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-22007"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-25-openjdk-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-demo-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-demo-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-demo-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-demo-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-devel-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-devel-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-devel-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-devel-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-headless-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-headless-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-headless-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-headless-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-javadoc-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-javadoc-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-javadoc-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-javadoc-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-jmods-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-jmods-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-jmods-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-jmods-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-src-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-src-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-src-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-src-25.0.3.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-22007",
"url": "https://www.suse.com/security/cve/CVE-2026-22007"
},
{
"category": "external",
"summary": "SUSE Bug 1262490 for CVE-2026-22007",
"url": "https://bugzilla.suse.com/1262490"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-25-openjdk-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-demo-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-demo-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-demo-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-demo-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-devel-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-devel-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-devel-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-devel-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-headless-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-headless-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-headless-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-headless-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-javadoc-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-javadoc-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-javadoc-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-javadoc-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-jmods-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-jmods-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-jmods-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-jmods-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-src-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-src-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-src-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-src-25.0.3.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.9,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:java-25-openjdk-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-demo-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-demo-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-demo-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-demo-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-devel-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-devel-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-devel-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-devel-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-headless-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-headless-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-headless-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-headless-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-javadoc-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-javadoc-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-javadoc-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-javadoc-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-jmods-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-jmods-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-jmods-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-jmods-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-src-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-src-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-src-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-src-25.0.3.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-28T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2026-22007"
},
{
"cve": "CVE-2026-22008",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-22008"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-25-openjdk-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-demo-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-demo-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-demo-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-demo-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-devel-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-devel-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-devel-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-devel-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-headless-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-headless-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-headless-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-headless-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-javadoc-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-javadoc-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-javadoc-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-javadoc-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-jmods-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-jmods-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-jmods-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-jmods-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-src-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-src-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-src-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-src-25.0.3.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-22008",
"url": "https://www.suse.com/security/cve/CVE-2026-22008"
},
{
"category": "external",
"summary": "SUSE Bug 1262493 for CVE-2026-22008",
"url": "https://bugzilla.suse.com/1262493"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-25-openjdk-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-demo-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-demo-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-demo-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-demo-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-devel-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-devel-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-devel-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-devel-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-headless-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-headless-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-headless-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-headless-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-javadoc-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-javadoc-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-javadoc-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-javadoc-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-jmods-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-jmods-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-jmods-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-jmods-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-src-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-src-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-src-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-src-25.0.3.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:java-25-openjdk-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-demo-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-demo-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-demo-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-demo-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-devel-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-devel-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-devel-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-devel-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-headless-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-headless-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-headless-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-headless-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-javadoc-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-javadoc-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-javadoc-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-javadoc-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-jmods-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-jmods-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-jmods-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-jmods-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-src-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-src-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-src-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-src-25.0.3.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-28T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2026-22008"
},
{
"cve": "CVE-2026-22013",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-22013"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-25-openjdk-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-demo-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-demo-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-demo-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-demo-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-devel-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-devel-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-devel-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-devel-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-headless-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-headless-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-headless-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-headless-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-javadoc-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-javadoc-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-javadoc-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-javadoc-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-jmods-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-jmods-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-jmods-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-jmods-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-src-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-src-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-src-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-src-25.0.3.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-22013",
"url": "https://www.suse.com/security/cve/CVE-2026-22013"
},
{
"category": "external",
"summary": "SUSE Bug 1262494 for CVE-2026-22013",
"url": "https://bugzilla.suse.com/1262494"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-25-openjdk-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-demo-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-demo-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-demo-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-demo-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-devel-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-devel-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-devel-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-devel-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-headless-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-headless-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-headless-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-headless-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-javadoc-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-javadoc-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-javadoc-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-javadoc-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-jmods-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-jmods-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-jmods-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-jmods-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-src-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-src-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-src-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-src-25.0.3.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:java-25-openjdk-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-demo-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-demo-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-demo-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-demo-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-devel-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-devel-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-devel-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-devel-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-headless-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-headless-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-headless-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-headless-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-javadoc-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-javadoc-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-javadoc-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-javadoc-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-jmods-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-jmods-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-jmods-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-jmods-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-src-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-src-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-src-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-src-25.0.3.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-28T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2026-22013"
},
{
"cve": "CVE-2026-22016",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-22016"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-25-openjdk-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-demo-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-demo-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-demo-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-demo-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-devel-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-devel-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-devel-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-devel-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-headless-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-headless-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-headless-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-headless-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-javadoc-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-javadoc-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-javadoc-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-javadoc-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-jmods-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-jmods-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-jmods-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-jmods-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-src-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-src-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-src-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-src-25.0.3.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-22016",
"url": "https://www.suse.com/security/cve/CVE-2026-22016"
},
{
"category": "external",
"summary": "SUSE Bug 1262495 for CVE-2026-22016",
"url": "https://bugzilla.suse.com/1262495"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-25-openjdk-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-demo-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-demo-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-demo-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-demo-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-devel-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-devel-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-devel-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-devel-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-headless-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-headless-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-headless-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-headless-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-javadoc-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-javadoc-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-javadoc-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-javadoc-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-jmods-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-jmods-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-jmods-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-jmods-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-src-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-src-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-src-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-src-25.0.3.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:java-25-openjdk-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-demo-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-demo-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-demo-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-demo-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-devel-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-devel-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-devel-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-devel-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-headless-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-headless-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-headless-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-headless-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-javadoc-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-javadoc-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-javadoc-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-javadoc-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-jmods-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-jmods-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-jmods-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-jmods-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-src-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-src-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-src-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-src-25.0.3.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-28T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2026-22016"
},
{
"cve": "CVE-2026-22018",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-22018"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-25-openjdk-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-demo-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-demo-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-demo-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-demo-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-devel-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-devel-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-devel-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-devel-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-headless-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-headless-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-headless-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-headless-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-javadoc-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-javadoc-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-javadoc-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-javadoc-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-jmods-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-jmods-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-jmods-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-jmods-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-src-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-src-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-src-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-src-25.0.3.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-22018",
"url": "https://www.suse.com/security/cve/CVE-2026-22018"
},
{
"category": "external",
"summary": "SUSE Bug 1262496 for CVE-2026-22018",
"url": "https://bugzilla.suse.com/1262496"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-25-openjdk-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-demo-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-demo-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-demo-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-demo-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-devel-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-devel-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-devel-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-devel-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-headless-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-headless-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-headless-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-headless-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-javadoc-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-javadoc-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-javadoc-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-javadoc-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-jmods-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-jmods-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-jmods-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-jmods-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-src-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-src-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-src-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-src-25.0.3.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:java-25-openjdk-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-demo-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-demo-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-demo-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-demo-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-devel-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-devel-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-devel-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-devel-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-headless-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-headless-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-headless-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-headless-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-javadoc-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-javadoc-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-javadoc-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-javadoc-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-jmods-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-jmods-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-jmods-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-jmods-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-src-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-src-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-src-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-src-25.0.3.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-28T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2026-22018"
},
{
"cve": "CVE-2026-22021",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-22021"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-25-openjdk-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-demo-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-demo-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-demo-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-demo-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-devel-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-devel-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-devel-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-devel-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-headless-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-headless-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-headless-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-headless-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-javadoc-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-javadoc-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-javadoc-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-javadoc-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-jmods-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-jmods-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-jmods-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-jmods-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-src-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-src-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-src-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-src-25.0.3.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-22021",
"url": "https://www.suse.com/security/cve/CVE-2026-22021"
},
{
"category": "external",
"summary": "SUSE Bug 1262497 for CVE-2026-22021",
"url": "https://bugzilla.suse.com/1262497"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-25-openjdk-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-demo-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-demo-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-demo-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-demo-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-devel-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-devel-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-devel-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-devel-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-headless-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-headless-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-headless-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-headless-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-javadoc-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-javadoc-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-javadoc-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-javadoc-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-jmods-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-jmods-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-jmods-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-jmods-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-src-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-src-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-src-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-src-25.0.3.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:java-25-openjdk-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-demo-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-demo-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-demo-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-demo-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-devel-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-devel-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-devel-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-devel-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-headless-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-headless-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-headless-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-headless-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-javadoc-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-javadoc-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-javadoc-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-javadoc-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-jmods-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-jmods-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-jmods-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-jmods-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-src-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-src-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-src-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-src-25.0.3.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-28T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2026-22021"
},
{
"cve": "CVE-2026-23865",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23865"
}
],
"notes": [
{
"category": "general",
"text": "An integer overflow in the tt_var_load_item_variation_store function of the Freetype library in versions 2.13.2 and 2.13.3 may allow for an out of bounds read operation when parsing HVAR/VVAR/MVAR tables in OpenType variable fonts. This issue is fixed in version 2.14.2.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-25-openjdk-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-demo-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-demo-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-demo-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-demo-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-devel-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-devel-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-devel-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-devel-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-headless-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-headless-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-headless-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-headless-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-javadoc-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-javadoc-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-javadoc-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-javadoc-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-jmods-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-jmods-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-jmods-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-jmods-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-src-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-src-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-src-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-src-25.0.3.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23865",
"url": "https://www.suse.com/security/cve/CVE-2026-23865"
},
{
"category": "external",
"summary": "SUSE Bug 1259118 for CVE-2026-23865",
"url": "https://bugzilla.suse.com/1259118"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-25-openjdk-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-demo-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-demo-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-demo-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-demo-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-devel-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-devel-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-devel-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-devel-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-headless-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-headless-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-headless-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-headless-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-javadoc-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-javadoc-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-javadoc-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-javadoc-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-jmods-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-jmods-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-jmods-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-jmods-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-src-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-src-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-src-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-src-25.0.3.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:java-25-openjdk-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-demo-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-demo-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-demo-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-demo-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-devel-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-devel-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-devel-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-devel-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-headless-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-headless-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-headless-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-headless-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-javadoc-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-javadoc-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-javadoc-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-javadoc-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-jmods-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-jmods-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-jmods-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-jmods-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-src-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-src-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-src-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-src-25.0.3.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-28T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2026-23865"
},
{
"cve": "CVE-2026-34268",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-34268"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-25-openjdk-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-demo-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-demo-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-demo-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-demo-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-devel-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-devel-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-devel-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-devel-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-headless-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-headless-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-headless-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-headless-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-javadoc-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-javadoc-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-javadoc-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-javadoc-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-jmods-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-jmods-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-jmods-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-jmods-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-src-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-src-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-src-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-src-25.0.3.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-34268",
"url": "https://www.suse.com/security/cve/CVE-2026-34268"
},
{
"category": "external",
"summary": "SUSE Bug 1262500 for CVE-2026-34268",
"url": "https://bugzilla.suse.com/1262500"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-25-openjdk-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-demo-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-demo-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-demo-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-demo-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-devel-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-devel-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-devel-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-devel-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-headless-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-headless-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-headless-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-headless-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-javadoc-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-javadoc-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-javadoc-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-javadoc-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-jmods-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-jmods-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-jmods-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-jmods-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-src-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-src-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-src-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-src-25.0.3.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.9,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:java-25-openjdk-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-demo-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-demo-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-demo-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-demo-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-devel-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-devel-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-devel-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-devel-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-headless-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-headless-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-headless-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-headless-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-javadoc-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-javadoc-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-javadoc-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-javadoc-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-jmods-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-jmods-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-jmods-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-jmods-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-src-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-src-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-src-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-src-25.0.3.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-28T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2026-34268"
},
{
"cve": "CVE-2026-34282",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-34282"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-25-openjdk-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-demo-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-demo-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-demo-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-demo-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-devel-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-devel-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-devel-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-devel-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-headless-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-headless-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-headless-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-headless-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-javadoc-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-javadoc-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-javadoc-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-javadoc-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-jmods-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-jmods-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-jmods-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-jmods-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-src-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-src-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-src-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-src-25.0.3.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-34282",
"url": "https://www.suse.com/security/cve/CVE-2026-34282"
},
{
"category": "external",
"summary": "SUSE Bug 1262501 for CVE-2026-34282",
"url": "https://bugzilla.suse.com/1262501"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-25-openjdk-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-demo-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-demo-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-demo-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-demo-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-devel-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-devel-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-devel-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-devel-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-headless-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-headless-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-headless-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-headless-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-javadoc-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-javadoc-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-javadoc-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-javadoc-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-jmods-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-jmods-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-jmods-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-jmods-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-src-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-src-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-src-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-src-25.0.3.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:java-25-openjdk-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-demo-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-demo-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-demo-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-demo-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-devel-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-devel-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-devel-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-devel-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-headless-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-headless-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-headless-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-headless-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-javadoc-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-javadoc-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-javadoc-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-javadoc-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-jmods-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-jmods-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-jmods-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-jmods-25.0.3.0-1.1.x86_64",
"openSUSE Tumbleweed:java-25-openjdk-src-25.0.3.0-1.1.aarch64",
"openSUSE Tumbleweed:java-25-openjdk-src-25.0.3.0-1.1.ppc64le",
"openSUSE Tumbleweed:java-25-openjdk-src-25.0.3.0-1.1.s390x",
"openSUSE Tumbleweed:java-25-openjdk-src-25.0.3.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-28T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2026-34282"
}
]
}
RHSA-2026:11822
Vulnerability from csaf_redhat - Published: 2026-04-30 20:38 - Updated: 2026-05-04 21:23No description is available for this CVE.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Temurin Build of OpenJDK 25.0.3
Red Hat / OpenJDK
|
cpe:/a:redhat:openjdk:25
|
— |
Vendor Fix
fix
|
No description is available for this CVE.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Temurin Build of OpenJDK 25.0.3
Red Hat / OpenJDK
|
cpe:/a:redhat:openjdk:25
|
— |
Vendor Fix
fix
|
A flaw was found in Freetype. An integer overflow vulnerability exists when processing specially crafted OpenType variable fonts. A local attacker could exploit this by convincing a user to open a malicious font file, which may lead to an out-of-bounds read and potential information disclosure or denial of service.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Temurin Build of OpenJDK 25.0.3
Red Hat / OpenJDK
|
cpe:/a:redhat:openjdk:25
|
— |
Vendor Fix
fix
|
No description is available for this CVE.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Temurin Build of OpenJDK 25.0.3
Red Hat / OpenJDK
|
cpe:/a:redhat:openjdk:25
|
— |
Vendor Fix
fix
|
| URL | Category |
|---|---|
| https://access.redhat.com/errata/RHSA-2026:11822 | self |
| https://access.redhat.com/security/updates/classi… | external |
| https://docs.redhat.com/en/documentation/red_hat_… | external |
| https://security.access.redhat.com/data/csaf/v2/a… | self |
| https://access.redhat.com/security/cve/CVE-2026-22007 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2460038 | external |
| https://www.cve.org/CVERecord?id=CVE-2026-22007 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2026-22007 | external |
| https://www.oracle.com/security-alerts/cpuapr2026… | external |
| https://access.redhat.com/security/cve/CVE-2026-22008 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2460029 | external |
| https://www.cve.org/CVERecord?id=CVE-2026-22008 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2026-22008 | external |
| https://access.redhat.com/security/cve/CVE-2026-22013 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2460040 | external |
| https://www.cve.org/CVERecord?id=CVE-2026-22013 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2026-22013 | external |
| https://access.redhat.com/security/cve/CVE-2026-22016 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2460039 | external |
| https://www.cve.org/CVERecord?id=CVE-2026-22016 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2026-22016 | external |
| https://access.redhat.com/security/cve/CVE-2026-22018 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2460041 | external |
| https://www.cve.org/CVERecord?id=CVE-2026-22018 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2026-22018 | external |
| https://access.redhat.com/security/cve/CVE-2026-22021 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2460042 | external |
| https://www.cve.org/CVERecord?id=CVE-2026-22021 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2026-22021 | external |
| https://access.redhat.com/security/cve/CVE-2026-23865 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2443891 | external |
| https://www.cve.org/CVERecord?id=CVE-2026-23865 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2026-23865 | external |
| https://gitlab.com/freetype/freetype/-/commit/fc8… | external |
| https://sourceforge.net/projects/freetype/files/f… | external |
| https://www.facebook.com/security/advisories/cve-… | external |
| https://access.redhat.com/security/cve/CVE-2026-34268 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2460043 | external |
| https://www.cve.org/CVERecord?id=CVE-2026-34268 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2026-34268 | external |
| https://access.redhat.com/security/cve/CVE-2026-34282 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2460044 | external |
| https://www.cve.org/CVERecord?id=CVE-2026-34282 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2026-34282 | external |
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update is now available for OpenJDK.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The OpenJDK 25 packages provide the OpenJDK 25 Java Runtime Environment and the OpenJDK 25 Java Software Development Kit.\n\nThis release of the Eclipse Temurin build of OpenJDK 25 (25.0.3) for Windows serves as a replacement for the Eclipse Temurin build of OpenJDK 25 (25.0.2) and includes security and bug fixes. For further information, refer to the release notes linked to in the References section.\n\nSecurity Fix(es):\n\n* JDK: Enhance crypto algorithm support (CVE-2026-22007)\n\n* JDK: Improved Arena allocations (CVE-2026-22008)\n\n* JDK: Improve Kerberos credentialing (CVE-2026-22013)\n\n* JDK: Enhance Path Factories Redux (CVE-2026-22016)\n\n* JDK: Enhance Zip file reading (CVE-2026-22018)\n\n* JDK: Enhance certificate chain validation (CVE-2026-22021)\n\n* JDK: Updating FreeType 2.14.1 (CVE-2026-23865)\n\n* JDK: Enhance TLS connection handling (CVE-2026-34282)\n\n* JDK: Enhance key generation (CVE-2026-34268)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:11822",
"url": "https://access.redhat.com/errata/RHSA-2026:11822"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://docs.redhat.com/en/documentation/red_hat_build_of_openjdk/25/html/release_notes_for_eclipse_temurin_25.0.3/index",
"url": "https://docs.redhat.com/en/documentation/red_hat_build_of_openjdk/25/html/release_notes_for_eclipse_temurin_25.0.3/index"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_11822.json"
}
],
"title": "Red Hat Security Advisory: OpenJDK 25.0.3 Security Update for Windows Builds",
"tracking": {
"current_release_date": "2026-05-04T21:23:50+00:00",
"generator": {
"date": "2026-05-04T21:23:50+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.9"
}
},
"id": "RHSA-2026:11822",
"initial_release_date": "2026-04-30T20:38:55+00:00",
"revision_history": [
{
"date": "2026-04-30T20:38:55+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-04-30T20:38:55+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-05-04T21:23:50+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Temurin Build of OpenJDK 25.0.3",
"product": {
"name": "Temurin Build of OpenJDK 25.0.3",
"product_id": "Temurin Build of OpenJDK 25.0.3",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openjdk:25"
}
}
}
],
"category": "product_family",
"name": "OpenJDK"
}
],
"category": "vendor",
"name": "Red Hat"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-22007",
"cwe": {
"id": "CWE-327",
"name": "Use of a Broken or Risky Cryptographic Algorithm"
},
"discovery_date": "2026-04-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2460038"
}
],
"notes": [
{
"category": "description",
"text": "No description is available for this CVE.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openjdk: OpenJDK: Enhance crypto algorithm support (Oracle CPU 2026-04)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Temurin Build of OpenJDK 25.0.3"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-22007"
},
{
"category": "external",
"summary": "RHBZ#2460038",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2460038"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-22007",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22007"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-22007",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-22007"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpuapr2026.html#AppendixJAVA",
"url": "https://www.oracle.com/security-alerts/cpuapr2026.html#AppendixJAVA"
}
],
"release_date": "2026-04-21T20:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-30T20:38:55+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Temurin Build of OpenJDK 25.0.3"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:11822"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 2.9,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"Temurin Build of OpenJDK 25.0.3"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "openjdk: OpenJDK: Enhance crypto algorithm support (Oracle CPU 2026-04)"
},
{
"cve": "CVE-2026-22008",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2026-04-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2460029"
}
],
"notes": [
{
"category": "description",
"text": "No description is available for this CVE.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openjdk: OpenJDK: Improved Arena allocations (Oracle CPU 2026-04)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Temurin Build of OpenJDK 25.0.3"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-22008"
},
{
"category": "external",
"summary": "RHBZ#2460029",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2460029"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-22008",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22008"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-22008",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-22008"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpuapr2026.html#AppendixJAVA",
"url": "https://www.oracle.com/security-alerts/cpuapr2026.html#AppendixJAVA"
}
],
"release_date": "2026-04-21T20:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-30T20:38:55+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Temurin Build of OpenJDK 25.0.3"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:11822"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 3.7,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"Temurin Build of OpenJDK 25.0.3"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "openjdk: OpenJDK: Improved Arena allocations (Oracle CPU 2026-04)"
},
{
"cve": "CVE-2026-22013",
"cwe": {
"id": "CWE-319",
"name": "Cleartext Transmission of Sensitive Information"
},
"discovery_date": "2026-04-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2460040"
}
],
"notes": [
{
"category": "description",
"text": "No description is available for this CVE.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openjdk: OpenJDK: Improve Kerberos credentialing (Oracle CPU 2026-04)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Temurin Build of OpenJDK 25.0.3"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-22013"
},
{
"category": "external",
"summary": "RHBZ#2460040",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2460040"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-22013",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22013"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-22013",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-22013"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpuapr2026.html#AppendixJAVA",
"url": "https://www.oracle.com/security-alerts/cpuapr2026.html#AppendixJAVA"
}
],
"release_date": "2026-04-21T20:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-30T20:38:55+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Temurin Build of OpenJDK 25.0.3"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:11822"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"Temurin Build of OpenJDK 25.0.3"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "openjdk: OpenJDK: Improve Kerberos credentialing (Oracle CPU 2026-04)"
},
{
"cve": "CVE-2026-22016",
"cwe": {
"id": "CWE-611",
"name": "Improper Restriction of XML External Entity Reference"
},
"discovery_date": "2026-04-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2460039"
}
],
"notes": [
{
"category": "description",
"text": "No description is available for this CVE.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openjdk: OpenJDK: Enhance Path Factories Redux (Oracle CPU 2026-04)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Temurin Build of OpenJDK 25.0.3"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-22016"
},
{
"category": "external",
"summary": "RHBZ#2460039",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2460039"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-22016",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22016"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-22016",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-22016"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpuapr2026.html#AppendixJAVA",
"url": "https://www.oracle.com/security-alerts/cpuapr2026.html#AppendixJAVA"
}
],
"release_date": "2026-04-21T20:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-30T20:38:55+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Temurin Build of OpenJDK 25.0.3"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:11822"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"Temurin Build of OpenJDK 25.0.3"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "openjdk: OpenJDK: Enhance Path Factories Redux (Oracle CPU 2026-04)"
},
{
"cve": "CVE-2026-22018",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2026-04-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2460041"
}
],
"notes": [
{
"category": "description",
"text": "No description is available for this CVE.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openjdk: OpenJDK: Enhance Zip file reading (Oracle CPU 2026-04)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Temurin Build of OpenJDK 25.0.3"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-22018"
},
{
"category": "external",
"summary": "RHBZ#2460041",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2460041"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-22018",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22018"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-22018",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-22018"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpuapr2026.html#AppendixJAVA",
"url": "https://www.oracle.com/security-alerts/cpuapr2026.html#AppendixJAVA"
}
],
"release_date": "2026-04-21T20:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-30T20:38:55+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Temurin Build of OpenJDK 25.0.3"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:11822"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 3.7,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"Temurin Build of OpenJDK 25.0.3"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "openjdk: OpenJDK: Enhance Zip file reading (Oracle CPU 2026-04)"
},
{
"cve": "CVE-2026-22021",
"cwe": {
"id": "CWE-674",
"name": "Uncontrolled Recursion"
},
"discovery_date": "2026-04-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2460042"
}
],
"notes": [
{
"category": "description",
"text": "No description is available for this CVE.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openjdk: OpenJDK: Enhance certificate chain validation (Oracle CPU 2026-04)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Temurin Build of OpenJDK 25.0.3"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-22021"
},
{
"category": "external",
"summary": "RHBZ#2460042",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2460042"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-22021",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22021"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-22021",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-22021"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpuapr2026.html#AppendixJAVA",
"url": "https://www.oracle.com/security-alerts/cpuapr2026.html#AppendixJAVA"
}
],
"release_date": "2026-04-21T20:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-30T20:38:55+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Temurin Build of OpenJDK 25.0.3"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:11822"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"Temurin Build of OpenJDK 25.0.3"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "openjdk: OpenJDK: Enhance certificate chain validation (Oracle CPU 2026-04)"
},
{
"cve": "CVE-2026-23865",
"discovery_date": "2026-03-02T17:01:54.514540+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2443891"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Freetype. An integer overflow vulnerability exists when processing specially crafted OpenType variable fonts. A local attacker could exploit this by convincing a user to open a malicious font file, which may lead to an out-of-bounds read and potential information disclosure or denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "freetype: Freetype: Information disclosure or denial of service via specially crafted font files",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This is a MODERATE impact vulnerability. An integer overflow in the Freetype library can lead to an out-of-bounds read when processing specially crafted OpenType variable fonts. Exploitation requires user interaction, such as opening a malicious font file.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Temurin Build of OpenJDK 25.0.3"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-23865"
},
{
"category": "external",
"summary": "RHBZ#2443891",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2443891"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-23865",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23865"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-23865",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-23865"
},
{
"category": "external",
"summary": "https://gitlab.com/freetype/freetype/-/commit/fc85a255849229c024c8e65f536fe1875d84841c",
"url": "https://gitlab.com/freetype/freetype/-/commit/fc85a255849229c024c8e65f536fe1875d84841c"
},
{
"category": "external",
"summary": "https://sourceforge.net/projects/freetype/files/freetype2/2.14.2/",
"url": "https://sourceforge.net/projects/freetype/files/freetype2/2.14.2/"
},
{
"category": "external",
"summary": "https://www.facebook.com/security/advisories/cve-2026-23865",
"url": "https://www.facebook.com/security/advisories/cve-2026-23865"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpuapr2026.html#AppendixJAVA",
"url": "https://www.oracle.com/security-alerts/cpuapr2026.html#AppendixJAVA"
}
],
"release_date": "2026-03-02T16:09:42.079000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-30T20:38:55+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Temurin Build of OpenJDK 25.0.3"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:11822"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"Temurin Build of OpenJDK 25.0.3"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "freetype: Freetype: Information disclosure or denial of service via specially crafted font files"
},
{
"cve": "CVE-2026-34268",
"cwe": {
"id": "CWE-327",
"name": "Use of a Broken or Risky Cryptographic Algorithm"
},
"discovery_date": "2026-04-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2460043"
}
],
"notes": [
{
"category": "description",
"text": "No description is available for this CVE.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openjdk: OpenJDK: Enhance key generation (Oracle CPU 2026-04)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Temurin Build of OpenJDK 25.0.3"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-34268"
},
{
"category": "external",
"summary": "RHBZ#2460043",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2460043"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-34268",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-34268"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-34268",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-34268"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpuapr2026.html#AppendixJAVA",
"url": "https://www.oracle.com/security-alerts/cpuapr2026.html#AppendixJAVA"
}
],
"release_date": "2026-04-21T20:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-30T20:38:55+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Temurin Build of OpenJDK 25.0.3"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:11822"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 2.9,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"Temurin Build of OpenJDK 25.0.3"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "openjdk: OpenJDK: Enhance key generation (Oracle CPU 2026-04)"
},
{
"cve": "CVE-2026-34282",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2026-04-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2460044"
}
],
"notes": [
{
"category": "description",
"text": "No description is available for this CVE.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openjdk: OpenJDK: Enhance TLS connection handling (Oracle CPU 2026-04)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Temurin Build of OpenJDK 25.0.3"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-34282"
},
{
"category": "external",
"summary": "RHBZ#2460044",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2460044"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-34282",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-34282"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-34282",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-34282"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpuapr2026.html#AppendixJAVA",
"url": "https://www.oracle.com/security-alerts/cpuapr2026.html#AppendixJAVA"
}
],
"release_date": "2026-04-21T20:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-30T20:38:55+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Temurin Build of OpenJDK 25.0.3"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:11822"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Temurin Build of OpenJDK 25.0.3"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "openjdk: OpenJDK: Enhance TLS connection handling (Oracle CPU 2026-04)"
}
]
}
RHSA-2026:7286
Vulnerability from csaf_redhat - Published: 2026-04-09 10:19 - Updated: 2026-04-30 21:34No description is available for this CVE.
CWE-122 - Heap-based Buffer Overflow| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: Red Hat Hardened Images:java-25-openjdk-portable-main@aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:java-25-openjdk-portable-main@src | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:java-25-openjdk-portable-main@x86_64 | — |
Vendor Fix
fix
|
| URL | Category |
|---|---|
| https://access.redhat.com/errata/RHSA-2026:7286 | self |
| https://images.redhat.com/ | external |
| https://access.redhat.com/security/cve/CVE-2026-22008 | external |
| https://access.redhat.com/security/updates/classi… | external |
| https://security.access.redhat.com/data/csaf/v2/a… | self |
| https://access.redhat.com/security/cve/CVE-2026-22008 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2460029 | external |
| https://www.cve.org/CVERecord?id=CVE-2026-22008 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2026-22008 | external |
| https://www.oracle.com/security-alerts/cpuapr2026… | external |
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Low"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for Red Hat Hardened Images RPMs is now available.",
"title": "Topic"
},
{
"category": "general",
"text": "This update includes the following RPMs:",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:7286",
"url": "https://access.redhat.com/errata/RHSA-2026:7286"
},
{
"category": "external",
"summary": "https://images.redhat.com/",
"url": "https://images.redhat.com/"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-22008",
"url": "https://access.redhat.com/security/cve/CVE-2026-22008"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_7286.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Hardened Images RPMs bug fix and enhancement update",
"tracking": {
"current_release_date": "2026-04-30T21:34:53+00:00",
"generator": {
"date": "2026-04-30T21:34:53+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.7"
}
},
"id": "RHSA-2026:7286",
"initial_release_date": "2026-04-09T10:19:28+00:00",
"revision_history": [
{
"date": "2026-04-09T10:19:28+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-04-23T09:48:09+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-04-30T21:34:53+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Hardened Images",
"product": {
"name": "Red Hat Hardened Images",
"product_id": "Red Hat Hardened Images",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:hummingbird:1"
}
}
}
],
"category": "product_family",
"name": "Red Hat Hardened Images"
},
{
"branches": [
{
"category": "product_version",
"name": "java-25-openjdk-portable-main@aarch64",
"product": {
"name": "java-25-openjdk-portable-main@aarch64",
"product_id": "java-25-openjdk-portable-main@aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-25-openjdk-portable@25.0.2.0.10-2.1.hum1?arch=aarch64\u0026distro=hummingbird-20251124\u0026repository_id=public-hummingbird-aarch64-rpms"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "java-25-openjdk-portable-main@src",
"product": {
"name": "java-25-openjdk-portable-main@src",
"product_id": "java-25-openjdk-portable-main@src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-25-openjdk-portable@25.0.2.0.10-2.1.hum1?arch=src\u0026distro=hummingbird-20251124\u0026repository_id=public-hummingbird-source-rpms"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "java-25-openjdk-portable-main@x86_64",
"product": {
"name": "java-25-openjdk-portable-main@x86_64",
"product_id": "java-25-openjdk-portable-main@x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-25-openjdk-portable@25.0.2.0.10-2.1.hum1?arch=x86_64\u0026distro=hummingbird-20251124\u0026repository_id=public-hummingbird-x86_64-rpms"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "java-25-openjdk-portable-main@aarch64 as a component of Red Hat Hardened Images",
"product_id": "Red Hat Hardened Images:java-25-openjdk-portable-main@aarch64"
},
"product_reference": "java-25-openjdk-portable-main@aarch64",
"relates_to_product_reference": "Red Hat Hardened Images"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-25-openjdk-portable-main@src as a component of Red Hat Hardened Images",
"product_id": "Red Hat Hardened Images:java-25-openjdk-portable-main@src"
},
"product_reference": "java-25-openjdk-portable-main@src",
"relates_to_product_reference": "Red Hat Hardened Images"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-25-openjdk-portable-main@x86_64 as a component of Red Hat Hardened Images",
"product_id": "Red Hat Hardened Images:java-25-openjdk-portable-main@x86_64"
},
"product_reference": "java-25-openjdk-portable-main@x86_64",
"relates_to_product_reference": "Red Hat Hardened Images"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-22008",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2026-04-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2460029"
}
],
"notes": [
{
"category": "description",
"text": "No description is available for this CVE.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openjdk: OpenJDK: Improved Arena allocations (Oracle CPU 2026-04)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:java-25-openjdk-portable-main@aarch64",
"Red Hat Hardened Images:java-25-openjdk-portable-main@src",
"Red Hat Hardened Images:java-25-openjdk-portable-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-22008"
},
{
"category": "external",
"summary": "RHBZ#2460029",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2460029"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-22008",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22008"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-22008",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-22008"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpuapr2026.html#AppendixJAVA",
"url": "https://www.oracle.com/security-alerts/cpuapr2026.html#AppendixJAVA"
}
],
"release_date": "2026-04-21T20:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T10:19:28+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:java-25-openjdk-portable-main@aarch64",
"Red Hat Hardened Images:java-25-openjdk-portable-main@src",
"Red Hat Hardened Images:java-25-openjdk-portable-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7286"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 3.7,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:java-25-openjdk-portable-main@aarch64",
"Red Hat Hardened Images:java-25-openjdk-portable-main@src",
"Red Hat Hardened Images:java-25-openjdk-portable-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "openjdk: OpenJDK: Improved Arena allocations (Oracle CPU 2026-04)"
}
]
}
RHSA-2026:7311
Vulnerability from csaf_redhat - Published: 2026-04-09 13:14 - Updated: 2026-04-30 21:34No description is available for this CVE.
CWE-122 - Heap-based Buffer Overflow| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: Red Hat Hardened Images:java-25-openjdk-main@aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:java-25-openjdk-main@src | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:java-25-openjdk-main@x86_64 | — |
Vendor Fix
fix
|
| URL | Category |
|---|---|
| https://access.redhat.com/errata/RHSA-2026:7311 | self |
| https://images.redhat.com/ | external |
| https://access.redhat.com/security/cve/CVE-2026-22008 | external |
| https://access.redhat.com/security/updates/classi… | external |
| https://security.access.redhat.com/data/csaf/v2/a… | self |
| https://access.redhat.com/security/cve/CVE-2026-22008 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2460029 | external |
| https://www.cve.org/CVERecord?id=CVE-2026-22008 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2026-22008 | external |
| https://www.oracle.com/security-alerts/cpuapr2026… | external |
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Low"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for Red Hat Hardened Images RPMs is now available.",
"title": "Topic"
},
{
"category": "general",
"text": "This update includes the following RPMs:",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:7311",
"url": "https://access.redhat.com/errata/RHSA-2026:7311"
},
{
"category": "external",
"summary": "https://images.redhat.com/",
"url": "https://images.redhat.com/"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-22008",
"url": "https://access.redhat.com/security/cve/CVE-2026-22008"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_7311.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Hardened Images RPMs bug fix and enhancement update",
"tracking": {
"current_release_date": "2026-04-30T21:34:54+00:00",
"generator": {
"date": "2026-04-30T21:34:54+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.7"
}
},
"id": "RHSA-2026:7311",
"initial_release_date": "2026-04-09T13:14:04+00:00",
"revision_history": [
{
"date": "2026-04-09T13:14:04+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-04-23T09:48:07+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-04-30T21:34:54+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Hardened Images",
"product": {
"name": "Red Hat Hardened Images",
"product_id": "Red Hat Hardened Images",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:hummingbird:1"
}
}
}
],
"category": "product_family",
"name": "Red Hat Hardened Images"
},
{
"branches": [
{
"category": "product_version",
"name": "java-25-openjdk-main@aarch64",
"product": {
"name": "java-25-openjdk-main@aarch64",
"product_id": "java-25-openjdk-main@aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-25-openjdk@25.0.2.0.10-5.1.hum1?arch=aarch64\u0026distro=hummingbird-20251124\u0026repository_id=public-hummingbird-aarch64-rpms"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "java-25-openjdk-main@src",
"product": {
"name": "java-25-openjdk-main@src",
"product_id": "java-25-openjdk-main@src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-25-openjdk@25.0.2.0.10-5.1.hum1?arch=src\u0026distro=hummingbird-20251124\u0026repository_id=public-hummingbird-source-rpms"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "java-25-openjdk-main@x86_64",
"product": {
"name": "java-25-openjdk-main@x86_64",
"product_id": "java-25-openjdk-main@x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-25-openjdk@25.0.2.0.10-5.1.hum1?arch=x86_64\u0026distro=hummingbird-20251124\u0026repository_id=public-hummingbird-x86_64-rpms"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "java-25-openjdk-main@aarch64 as a component of Red Hat Hardened Images",
"product_id": "Red Hat Hardened Images:java-25-openjdk-main@aarch64"
},
"product_reference": "java-25-openjdk-main@aarch64",
"relates_to_product_reference": "Red Hat Hardened Images"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-25-openjdk-main@src as a component of Red Hat Hardened Images",
"product_id": "Red Hat Hardened Images:java-25-openjdk-main@src"
},
"product_reference": "java-25-openjdk-main@src",
"relates_to_product_reference": "Red Hat Hardened Images"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-25-openjdk-main@x86_64 as a component of Red Hat Hardened Images",
"product_id": "Red Hat Hardened Images:java-25-openjdk-main@x86_64"
},
"product_reference": "java-25-openjdk-main@x86_64",
"relates_to_product_reference": "Red Hat Hardened Images"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-22008",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2026-04-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2460029"
}
],
"notes": [
{
"category": "description",
"text": "No description is available for this CVE.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openjdk: OpenJDK: Improved Arena allocations (Oracle CPU 2026-04)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:java-25-openjdk-main@aarch64",
"Red Hat Hardened Images:java-25-openjdk-main@src",
"Red Hat Hardened Images:java-25-openjdk-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-22008"
},
{
"category": "external",
"summary": "RHBZ#2460029",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2460029"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-22008",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22008"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-22008",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-22008"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpuapr2026.html#AppendixJAVA",
"url": "https://www.oracle.com/security-alerts/cpuapr2026.html#AppendixJAVA"
}
],
"release_date": "2026-04-21T20:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T13:14:04+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:java-25-openjdk-main@aarch64",
"Red Hat Hardened Images:java-25-openjdk-main@src",
"Red Hat Hardened Images:java-25-openjdk-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7311"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 3.7,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:java-25-openjdk-main@aarch64",
"Red Hat Hardened Images:java-25-openjdk-main@src",
"Red Hat Hardened Images:java-25-openjdk-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "openjdk: OpenJDK: Improved Arena allocations (Oracle CPU 2026-04)"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.